LogoLogo
HomePricingSelf-hosted docsAPI docsLogin
  • Home
  • Login to hava
  • Developer
  • Getting Started
    • Quickstart
      • Create New Account
      • Import Demo Data
      • Creating Environments
      • Exporting Diagrams
  • AWS Marketplace
  • Using Hava
    • Providers & Sources
    • Environments
      • Creating Environments
      • Filtering Environments
  • Importing Data
    • Demo Data
    • AWS
      • Getting Started with AWS
        • Cross Account Role
        • Read Only IAM User
        • Minimum Access IAM User
      • AWS Supported Resources
      • AWS Views
        • Infrastructure
        • Security
        • Container - ECS
        • List
    • Azure
      • Getting Started with Azure
        • Powershell
        • Azure Portal
      • Azure Supported Resources
      • Azure Views
        • Infrastructure
        • Azure Security View
        • List
    • Google Cloud
      • Getting Started with GCP
        • Service Account
        • Import Multiple Projects
        • Enabling APIs
      • GCP Supported Resources
      • GCP Views
        • Infrastructure
        • List
    • Kubernetes
      • Getting Started with Kubernetes
        • Read Only Kubeconfig
        • Automatic Import of Managed Kubernetes
          • AWS EKS Cluster Configuration
        • Converting certificate files to certificate data fields
      • Kubernetes Supported Resources
      • Kubernetes Views
        • Container
        • List
    • Import Errors
  • Discover
    • Importing
    • Searching
      • Search Overview
      • Search Syntax
        • VPC Search
        • Wildcard Search
        • Tag Search
        • Deep Search
      • Search Examples
        • Discover Resources From Regions
        • Create a multiple VPC diagram
        • Defining Custom Environments
    • Versioning
      • Tracking Changes in Cloud Architecture
    • Manual Sync
  • Diagram
    • Listing Environments
      • Filtering Environments
      • Favouriting Environments
    • Viewing Environments
      • Diagram Controls
      • Diagram Layout
      • Switch Between Views
      • Diagram Canvas Resource Filters
    • Draw Custom Connections
  • Diagnose
    • Architectural Monitoring Alerts
    • Attributes
    • Cost Estimation
    • Diff View - Comparing Diagrams
    • Infrastructure
      • View Route Tables
      • View ACLs
      • View Security Groups
    • Reports
      • AWS Compliance Reports
  • Document
    • Environment Notes
    • Embed
    • Exporting Diagrams
    • Edit
      • Draw.io
  • Collaboration
    • Teams
    • Inviting Users
    • Disabling users
    • SSO/SAML
      • Overview
      • Azure AD - SAML Setup
      • Azure AD - OIDC Setup
      • Okta - SAML Setup
      • Okta - OIDC Setup
      • Trouble Shooting SSO
    • Project folders
  • Integrations
    • AWS Control Tower
    • CLI
    • Confluence Cloud
    • GitHub
    • Terraform
  • API
    • API Docs
  • Account & Billing
    • Types Of Hava Accounts
    • Change Subscription
    • Switch to AWS marketplace
    • Change Password
    • MFA
    • Download Invoice
    • Cancel Account
    • Account Audit Log
  • Quick Look
    • Quick AWS Overview
    • Security Overview
    • Customize the Hava Dashboard
Powered by GitBook
On this page
  • Using the Azure Portal
  • Creating a Microsoft Entra ID (Active Directory) Application
  • Register an application
  • Assign Roles to the Application
  • Get your parameters to give access to Hava
  • Create a Secret Key

Was this helpful?

  1. Importing Data
  2. Azure
  3. Getting Started with Azure

Azure Portal

PreviousPowershellNextAzure Supported Resources

Last updated 1 year ago

Was this helpful?

The recommended method to create your credentials is using . It can be run locally or directly from the Azure Portal, and offers a much simpler approach.

Using the Azure Portal

There are quite a few steps required to allow Hava to access your Azure resources using the Azure Portal.

To allow Hava to import your Azure account you will need to provide access by creating an Active Directory (Microsoft Entra ID) application and assigning read-only permissions to it. To create Entra ID applications you will need admin access to the Azure account.

Creating a Microsoft Entra ID (Active Directory) Application

  1. Using the search bar in the Azure Portal interface, search for Entra ID

  2. Click and open Microsoft Entra ID from the search results

  1. Select App Registration from the left side menu within Azure Active Directory

  1. Click + New registration

Register an application

Enter the following details to register the application.

  1. Name: Hava

  2. Application Type: Web

  3. Redirect URI: https://app.hava.io/login

  4. Click Register

Assign Roles to the Application

This will step you through adding a role for the application at the subscription level; this will grant Hava access to read everything in your account but not make any changes. You can also apply the access to a specific resource group or groups, or even individual resources - Hava will only draw the resources you give it access to.

  1. Using the top search bar, Search for Subscriptions

  2. Click and open Subscriptions from the search results

Select the subscription you would like to assign access to by clicking it.

Add a role assignment

1. On the left menu click Access control (IAM)

2. Click + Add 3. Then Add role assignment

4. Set role to Reader

5. Select - Type in Hava now select Hava from the search results, and this should now be added to Selected members:

6. Click Review + Assign

Get your parameters to give access to Hava

You will need four separate parameters to give Hava access to your account, first off is the subscription ID.

Subscription ID

While still in the Subscriptions section.

1. Navigate to Overview 2. Copy the Subscription ID and paste into Hava.

Application ID and Tenant ID

  1. Search for Entra ID

  2. Open Microsoft Entra ID

  3. Click App Registrations from the side menu

  4. Click and open Hava from the app registration list.

Here you will find the Application ID and Tenant ID to copy and paste into Hava.

1. Application ID 2. Directory Tenant ID

Create a Secret Key

  1. Click on Certificates & secrets

  1. Add + New client secret

  1. Description HavaAccessKey or any other description you like.

  2. Set Expires to 24 Months

  3. Click Add

6. Copy and paste the Secret Key Value into Hava

In Hava add source, select the Azure tab

Field 1 (Subscription ID) - Enter the Azure Subscription ID

Field 2 (Tenant ID) - Enter the Azure Hava App Directory Tenant ID

Field 3 (Client ID) - Enter the Azure Hava Application (Client) ID

Field 4 (Secret Key) - Enter the Azure Hava App Secrets access key Value

Choose a project (or set to Default)

Enter a name for the new source

Click Import and the environment import will start.

Powershell